Bluetooth security
Na minha lista:
Autor principal: | Gehrmann, Christian |
---|---|
Autor Corporativo: | ebrary, Inc |
Outros Autores: | Persson, Joakim, Smeets, Ben |
Formato: | Recurso Electrónico livro electrónico |
Idioma: | inglês |
Publicado em: |
Boston :
Artech House,
c2004.
|
Colecção: | Artech House computer security series.
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Inside Bluetooth low energy /
Por: Gupta, Naresh C. (Naresh Chand)
Publicado em: (2013)
Por: Gupta, Naresh C. (Naresh Chand)
Publicado em: (2013)
Wireless personal communications Bluetooth and other technologies /
Publicado em: (2001)
Publicado em: (2001)
Wireless communications security : solutions for the internet of things /
Por: Penttinen, Jyrki T. J.
Publicado em: (2017)
Por: Penttinen, Jyrki T. J.
Publicado em: (2017)
Security for mobile networks and platforms
Por: Aissi, Selim
Publicado em: (2006)
Por: Aissi, Selim
Publicado em: (2006)
Security in wireless LANs and MANs
Por: Hardjono, Thomas
Publicado em: (2005)
Por: Hardjono, Thomas
Publicado em: (2005)
How to cheat at securing a wireless network
Publicado em: (2006)
Publicado em: (2006)
WarDriving drive, detect, defend: a guide to wireless security /
Por: Hurley, Chris
Publicado em: (2004)
Por: Hurley, Chris
Publicado em: (2004)
Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security /
Por: Chandra, Praphul
Publicado em: (2005)
Por: Chandra, Praphul
Publicado em: (2005)
Wireless mobile internet security
Por: Rhee, Man Young
Publicado em: (2013)
Por: Rhee, Man Young
Publicado em: (2013)
Mobile security
Por: Furnell, Steven
Publicado em: (2009)
Por: Furnell, Steven
Publicado em: (2009)
BackTrack testing wireless network security /
Por: Cardwell, Kevin
Publicado em: (2013)
Por: Cardwell, Kevin
Publicado em: (2013)
Information security a manager's guide to thwarting data thieves and hackers /
Por: Alexander, Philip, 1963-
Publicado em: (2008)
Por: Alexander, Philip, 1963-
Publicado em: (2008)
Enterprise information security and privacy
Publicado em: (2009)
Publicado em: (2009)
Dictionary of information security
Por: Slade, Robert
Publicado em: (2006)
Por: Slade, Robert
Publicado em: (2006)
Designing network security : a practical guide to creating a secure network infrastructure /
Por: Kaeo, Merike
Publicado em: (2004)
Por: Kaeo, Merike
Publicado em: (2004)
Web commerce security design and development /
Por: Nahari, Hadi
Publicado em: (2011)
Por: Nahari, Hadi
Publicado em: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
Por: Mularien, Peter
Publicado em: (2010)
Por: Mularien, Peter
Publicado em: (2010)
Internet security and firewalls
Por: Preetham, V. V.
Publicado em: (2002)
Por: Preetham, V. V.
Publicado em: (2002)
Security secrets, intruders and ID tags.
Publicado em: (2003)
Publicado em: (2003)
Web 2.0 security defending Ajax, RIA, and SOA /
Por: Shah, Shreeraj
Publicado em: (2008)
Por: Shah, Shreeraj
Publicado em: (2008)
Cyber security /
Publicado em: (2014)
Publicado em: (2014)
Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
Por: El-Bawab, Abd El-Monem A.
Publicado em: (2014)
Por: El-Bawab, Abd El-Monem A.
Publicado em: (2014)
Advances in cyber security : technology, operations, and experiences /
Publicado em: (2013)
Publicado em: (2013)
Network security /
Por: Perez, Andre
Publicado em: (2014)
Por: Perez, Andre
Publicado em: (2014)
Cloud security a comprehensive guide to secure cloud computing /
Por: Krutz, Ronald L.
Publicado em: (2010)
Por: Krutz, Ronald L.
Publicado em: (2010)
IoT security issues /
Por: Gilchrist, Alasdair
Publicado em: (2017)
Por: Gilchrist, Alasdair
Publicado em: (2017)
Developer's guide to web application security
Por: Cross, Michael
Publicado em: (2007)
Por: Cross, Michael
Publicado em: (2007)
Network security foundations
Por: Strebe, Matthew
Publicado em: (2004)
Por: Strebe, Matthew
Publicado em: (2004)
Computer security fundamentals /
Por: Easttom, Chuck
Publicado em: (2006)
Por: Easttom, Chuck
Publicado em: (2006)
Mastering network security
Por: Brenton, Chris
Publicado em: (2003)
Por: Brenton, Chris
Publicado em: (2003)
Security risk management building an information security risk management program from the ground up /
Por: Wheeler, Evan
Publicado em: (2011)
Por: Wheeler, Evan
Publicado em: (2011)
Security architect : careers in information security /
Por: Collins, Jon
Publicado em: (2014)
Por: Collins, Jon
Publicado em: (2014)
Network security evaluation using the NSA IEM /
Por: Fuller, Ed
Publicado em: (2005)
Por: Fuller, Ed
Publicado em: (2005)
Security and privacy in the digital era.
Por: Guerrier, Claudine
Publicado em: (2016)
Por: Guerrier, Claudine
Publicado em: (2016)
Computer and information security handbook
Publicado em: (2009)
Publicado em: (2009)
Special issue on internet security
Publicado em: (2002)
Publicado em: (2002)
Cyber security and resiliency policy framework /
Publicado em: (2014)
Publicado em: (2014)
Web security basics
Por: Bhasin, Shweta, 1977-
Publicado em: (2003)
Por: Bhasin, Shweta, 1977-
Publicado em: (2003)
The essential guide to home computer security
Por: Rowlingson, Robert R.
Publicado em: (2011)
Por: Rowlingson, Robert R.
Publicado em: (2011)
Android security internals : an in-depth guide to android's security architecture /
Por: Elenkov, Nikolay
Publicado em: (2015)
Por: Elenkov, Nikolay
Publicado em: (2015)
Registos relacionados
-
Inside Bluetooth low energy /
Por: Gupta, Naresh C. (Naresh Chand)
Publicado em: (2013) -
Wireless personal communications Bluetooth and other technologies /
Publicado em: (2001) -
Wireless communications security : solutions for the internet of things /
Por: Penttinen, Jyrki T. J.
Publicado em: (2017) -
Security for mobile networks and platforms
Por: Aissi, Selim
Publicado em: (2006) -
Security in wireless LANs and MANs
Por: Hardjono, Thomas
Publicado em: (2005)